
2 minute read
puter viruses more than 2 aspirins
Distributors:
NORTHEAST
Coastal Specialty Forest Products
Hookset, N.H.
N.H. only 800-424-4036
N.E. other 800-932-9663
Hudson Building Supply Company
Ashley, Pa.i 71 7-829-57 31
SOUTHEAST
Epperson Lumber Sales
Statesville. N C. | 7 O+87 3-4321
Wholesale Wood Ploducts
Dothan, Al. / 205-793-6028
LAKE STATES
Badger Wholesale Lumber, Inc.
Cottage Grove, Wi. /608-839-4565
Chicago Suburban Lumber Sales
Forest Park, ll. I 31 2-7 7 1-8181
Hager Distribution
Grand Rapids, Mi. | 616-247 -79U
Hudson Building Supply Company
Elkhart, In./21 9-262-3666
North Santiam Lumber Co. of Ohio
Columbus, Oh. | 61 4-27 2-8111
MIDWEST
Canton Redwood Sales
M innea polis, Mn. | 61 2-425-1 4OO
Weekes Forest Products, Inc.
Minneapolis, Mn./61 2-721-8585
Mn. Watts 800-352-2766
Regional Watts 80G328-2890
MOUNTAIN
Click & Geddes Lumber Company
Denver, Co. /303-534-01 95
Kaibab lndustries
Englewood, Co. /303-761-9882
Reid & Wright Lumber
Broomf ield, Co. /303-460-9663 salt Lake city, Ut./801-972-5525
Weyerhaeuser Co.
SOUTHWEST
Capital Lumber Company
Phoenix, Az. 602-269-6225
Peralta, N.M. 505-877 -7 222
Lubbock, Tx. 806-747-3191
LeeRoy Jordan Lumber Company
Dallas, Tx. 21 4-357 -7 311
Ausrin, Tx. 51 2-385-5334
Slaughter Bros.
Dallas, Tx. / 21 4-341-9000
Memohis. Tn./901-365-6500 ers, in?
HOW SECURE is a home center computer system against hackviruses, vandalism and break- r All software should be purchased from known, reputable sources. o All purchased software should be in its original shrink wrap or sealed diskette containers when received. o Backup copies of all original software should be made as soon as the software package is opened. Backup copies should be stored offsite. o Once purchased, all software should be reviewed carefully by a system manager before it is installed on a distributed system, or computer network. o New software should be quarantined on an isolated computer. This testing will reduce greatly the risk of virus contamination. r A backup copy of all system software and data should be made at least once a month, with the backup copy stored for at least one year before reuse. This will allow restoration of a system that has been contaminated by a "time-released" virus. o All programs on a system should be checked regularly for changes in program length. Any size deviations could be evidence of tampering or virus infiltration. o Many "shareware" or "freeware" programs are invaluable. However, these programs are the prime entry point for system viruses. Skeptical review of such programs is prudent. o Any software that exhibits symptoms of possible virus contamination should be removed from general use immediately. System managers should develop plans for quick removal from service of all copies of a suspect program and immediate backup of all related data.
As virus epidemics, illegal transactions and hacker sabotage make the headlines, home center managers worry about special security practices they should be following. The following recommendations from the National LAN Laboratory in Reston, Va., aim at avoiding infection. Following them will help to prevent and control virus contamination.
. System administrators should restrict access to programs and data. This isolates problems, protects critical applications and facilitates the diagnosis of problems.
Additional security measures recommeded in the industry include careful control of passwords including terminating passwords promptly when an employee leaves the company. Experts suggest avoiding common passwords such as names. Some companies develop two level codes using symbols, numbers and letters on the keyboard to construct a password.
Turning off the modem when data is not being received can prevent access by unauthorized persons. Although it involves manual input, there are companies downloading outside data onto personal computers and rekeying it into the mainframe. Keeping backups of all information in a safe location can prevent loss in a fire or disaster.
Story at a Glance
Ways to keep your computer system healthy. precautions to cut contamination. . security practices that work.